7 research outputs found

    A review of the application of acoustic emission technique in engineering

    Get PDF
    The use of acoustic emission (AE) technique for detecting and monitoring damages and the progress on damages in different structures is widely used and has earned a reputation as one of the most reliable and well-established technique in non-destructive testing (NDT). Acoustic Emission is a very efficient and effective technology used for fracture behavior and fatigue detection in metals, fiberglass, wood, composites, ceramics, concrete and plastics. It can also be used for detecting faults and pressure leaks in vessels, tanks, pipes, as well as for monitoring the progression of corrosion in welding. This paper reviews major research developments over the past few years in application of acoustic emission in numerous engineering fields, including manufacturing, civil, aerospace and material engineering

    Optimized topology control in mobile IP networks using a new parametric routing algorithm

    Get PDF
    When some intermediate nodes fail or are suddenly removed in a mobile IP network, a node failure can disconnect paths and decrease network efficiency due to loss of some packets. In this case, the movement of the remaining nodes must be controlled such that to prevent further network efficiency drop. In the present research, we will study the intermediate node failure and changing foreign networks in mobile IP networks when the Mobile Node (MN) moves. Then, a new optimal routing algorithm is proposed to make up the node failure and changing Foreign Agent (FA). For this purpose, an Optimal Parametric Topology Control Routing (OPTCR) algorithm is introduced based on parametric linear programming formulation (LPF). Since OPTCR can handle the handover latency, it is supposed that both destination and intermediate nodes can move but just intermediate nodes may fail. Simulation results show that OPTCR algorithm is superior to some algorithms appeared in the recent literature

    Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

    Get PDF
    The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms

    Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach

    Get PDF
    Quality of service (QoS) is an essential consideration and an open challenge in computer networking. Providing QoS guarantees becomes even more challenging when the complexities of mobile IP networks are taken into account. In a Mobile IP Network, when a node moves, it may go away from other nodes, this node movement decreases the available bandwidth, reduces the data transmission rate and increases the propagation delay. These issues affect the network efficiency and make a significant reduction in Mobile IP network performance and utilization. In other words, uncontrolled node movements in a Mobile IP network cause network failure, and nonoptimized mobile node movements from a Foreign Network to another Foreign Network lead to an increase in handoff latency. This work is going to improve network efficiency to guarantee QoS in Mobile IP Network by increasing data transmission rate, avoiding communication failure, and reducing handoff latency. The proposed work has been used to optimize data transmission rate by controlling the node movements and node shiftings in a limited domain, avoid communication failure by preventing nodes from exiting their domain and reduce the handoff latency in Mobile IP networks. In the proposed approaches, to overcome the mentioned issues in Mobile IP networks when a Mobile Node moves, parametric linear programming and graph theory are employed. To achieve mobility control in Mobile IP networks, a new linear programming formulation for guaranteeing the optimality of data transmission and network connectivity is proposed. This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. The proposed algorithms are evaluated by considering different metrics, computation modellings, and measurements on the simulation. The simulation results reveal noticeable data transmission rate improvement over previous routing approaches by optimizing the linear programming models. The proposed node movement control algorithm achieves a 31 percent improvement compared to HMIP and FMIP. Furthermore, Optimized Parametric Topology Control Routing algorithm performs significantly better than Triangular Routing Method and Change Foreign Agent Algorithm. The simulation results show the improvement is about 50 percent reduction of handover latency in different Mobile IP network scenar ios

    Security analysis method of recognition-based graphical password

    No full text
    One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human's brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented

    QTLs Controlling Physiological and Morphological Traits of Barley (<i>Hordeum</i> <i>vulgare</i> L.) Seedlings under Salinity, Drought, and Normal Conditions

    No full text
    To identify the genomic regions for the physiological and morphological traits of barley genotypes under normal salinity and drought, a set of 103 recombinant inbred line (RIL) populations, developed between Badia and Kavir crosses, was evaluated under phytotron conditions in a completely randomized design in 2019. Linkage maps were prepared using 152 SSR markers, 72 ISSR, 7 IRAP, 29 CAAT, 27 SCoT, and 15 iPBS alleles. The markers were assigned to seven barley chromosomes and covered 999.29 centimorgans (cM) of the barley genome. In addition, composite interval mapping showed 8, 9, and 26 quantitative trait loci (QTLs) under normal, drought, and salinity stress conditions, respectively. Our results indicate the importance of chromosomes 1, 4, 5, and 7 in salinity stress. These regions were involved in genes controlling stomata length (LR), leaf number (LN), leaf weight (LW), and genetic score (SCR). Three major stable pleiotropic QTLs (i.e., qSCS-1, qRLS-1, and qLNN-1) were associated with SCR, root length (RL), and root number (RN) in both treatments (i.e., normal and salinity), and two major stable pleiotropic QTLs (i.e., qSNN-3 and qLWS-3) associated with the stomata number (SN) and LW appeared to be promising for marker-assisted selection (MAS). Two major-effect QTLs (i.e., SCot8-B-CAAT5-D and HVM54-Bmag0571) on chromosomes 1 and 2 were characterized for their positive allele effect, which can be used to develop barley varieties concerning drought conditions. The new alleles (i.e., qLWS-4a, qSLS-4, qLNS-7b, qSCS-7, and qLNS-7a) identified in this study are useful in pyramiding elite alleles for molecular breeding and marker assisted selection for improving salinity tolerance in barley

    Optimized performance data transmission in Mobile IP networks

    No full text
    In a Mobile IP network (MIPN), nodes move. When a node moves, it may go away from other nodes and this decreases available bandwidth and data rate and increases the propagation delay of links. Therefore, nodes’ movement can decrease data delivery and handoff latency; these will reduce network efficiency. Suppose that an MIPN uses an optimal routing algorithm and transmits data from a source node to a destination node optimally. Nodes’ movement can violate the optimality of the data transmission and this will waste bandwidth and network resources. In this paper we present a new parametric optimal unicast multichannel routing algorithm that computes a domain for a mobile node and this domain will hold the optimality of data transmission and prevent network efficiency failure. Our new method determines an optimal domain for each mobile node and does not allow nodes to exit from that optimal domain. Simulation results show that our new method increases data rate and network efficiency
    corecore